Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0834 (GCVE-0-2009-0834)
Vulnerability from cvelistv5
- n/a
 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:48:52.350Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35390"
          },
          {
            "name": "1022153",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022153"
          },
          {
            "name": "34962",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34962"
          },
          {
            "name": "MDVSA-2009:118",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
          },
          {
            "name": "SUSE-SA:2009:028",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
          },
          {
            "name": "37471",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "RHSA-2009:0459",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://scary.beasts.org/security/CESA-2009-001.html"
          },
          {
            "name": "linux-kernel-auditsyscallentry-sec-bypass(49061)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
          },
          {
            "name": "DSA-1794",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1794"
          },
          {
            "name": "20090516 rPSA-2009-0084-1 kernel",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
          },
          {
            "name": "SUSE-SA:2009:030",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
          },
          {
            "name": "USN-751-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-751-1"
          },
          {
            "name": "35185",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35185"
          },
          {
            "name": "35015",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35015"
          },
          {
            "name": "oval:org.mitre.oval:def:8508",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
          },
          {
            "name": "35011",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35011"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "name": "35120",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35120"
          },
          {
            "name": "SUSE-SA:2009:031",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
          },
          {
            "name": "34084",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34084"
          },
          {
            "name": "34981",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34981"
          },
          {
            "name": "DSA-1800",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1800"
          },
          {
            "name": "oval:org.mitre.oval:def:9600",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
          },
          {
            "name": "34917",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34917"
          },
          {
            "name": "DSA-1787",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1787"
          },
          {
            "name": "[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
          },
          {
            "name": "RHSA-2009:0473",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
          },
          {
            "name": "RHSA-2009:0451",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
          },
          {
            "name": "[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
          },
          {
            "name": "35121",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35121"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
          },
          {
            "name": "ADV-2009-3316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "name": "33951",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33951"
          },
          {
            "name": "35394",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35394"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35390"
        },
        {
          "name": "1022153",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022153"
        },
        {
          "name": "34962",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34962"
        },
        {
          "name": "MDVSA-2009:118",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
        },
        {
          "name": "SUSE-SA:2009:028",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
        },
        {
          "name": "37471",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37471"
        },
        {
          "name": "RHSA-2009:0459",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://scary.beasts.org/security/CESA-2009-001.html"
        },
        {
          "name": "linux-kernel-auditsyscallentry-sec-bypass(49061)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
        },
        {
          "name": "[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
        },
        {
          "name": "DSA-1794",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1794"
        },
        {
          "name": "20090516 rPSA-2009-0084-1 kernel",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
        },
        {
          "name": "SUSE-SA:2009:030",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
        },
        {
          "name": "USN-751-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-751-1"
        },
        {
          "name": "35185",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35185"
        },
        {
          "name": "35015",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35015"
        },
        {
          "name": "oval:org.mitre.oval:def:8508",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
        },
        {
          "name": "35011",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35011"
        },
        {
          "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
        },
        {
          "name": "35120",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35120"
        },
        {
          "name": "SUSE-SA:2009:031",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
        },
        {
          "name": "34084",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34084"
        },
        {
          "name": "34981",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34981"
        },
        {
          "name": "DSA-1800",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1800"
        },
        {
          "name": "oval:org.mitre.oval:def:9600",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
        },
        {
          "name": "34917",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34917"
        },
        {
          "name": "DSA-1787",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1787"
        },
        {
          "name": "[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "name": "RHSA-2009:0473",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
        },
        {
          "name": "RHSA-2009:0451",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
        },
        {
          "name": "[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
        },
        {
          "name": "35121",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35121"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
        },
        {
          "name": "ADV-2009-3316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3316"
        },
        {
          "name": "33951",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33951"
        },
        {
          "name": "35394",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35394"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35390"
            },
            {
              "name": "1022153",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022153"
            },
            {
              "name": "34962",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34962"
            },
            {
              "name": "MDVSA-2009:118",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
            },
            {
              "name": "SUSE-SA:2009:028",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
            },
            {
              "name": "37471",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37471"
            },
            {
              "name": "RHSA-2009:0459",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
            },
            {
              "name": "http://scary.beasts.org/security/CESA-2009-001.html",
              "refsource": "MISC",
              "url": "http://scary.beasts.org/security/CESA-2009-001.html"
            },
            {
              "name": "linux-kernel-auditsyscallentry-sec-bypass(49061)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
            },
            {
              "name": "[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
            },
            {
              "name": "DSA-1794",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1794"
            },
            {
              "name": "20090516 rPSA-2009-0084-1 kernel",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
            },
            {
              "name": "SUSE-SA:2009:030",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
            },
            {
              "name": "USN-751-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-751-1"
            },
            {
              "name": "35185",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35185"
            },
            {
              "name": "35015",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35015"
            },
            {
              "name": "oval:org.mitre.oval:def:8508",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
            },
            {
              "name": "35011",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35011"
            },
            {
              "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
            },
            {
              "name": "35120",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35120"
            },
            {
              "name": "SUSE-SA:2009:031",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
            },
            {
              "name": "34084",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34084"
            },
            {
              "name": "34981",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34981"
            },
            {
              "name": "DSA-1800",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1800"
            },
            {
              "name": "oval:org.mitre.oval:def:9600",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
            },
            {
              "name": "34917",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34917"
            },
            {
              "name": "DSA-1787",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1787"
            },
            {
              "name": "[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=487990",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
            },
            {
              "name": "RHSA-2009:0473",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
            },
            {
              "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084",
              "refsource": "CONFIRM",
              "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
            },
            {
              "name": "RHSA-2009:0451",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
            },
            {
              "name": "[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
            },
            {
              "name": "35121",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35121"
            },
            {
              "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
            },
            {
              "name": "ADV-2009-3316",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3316"
            },
            {
              "name": "33951",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33951"
            },
            {
              "name": "35394",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35394"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0834",
    "datePublished": "2009-03-06T11:00:00",
    "dateReserved": "2009-03-06T00:00:00",
    "dateUpdated": "2024-08-07T04:48:52.350Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-0834\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-03-06T11:30:02.627\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n audit_syscall_entry en el n\u00facleo de Linux v2.6.28.7 y versiones anteriores en la plataforma x86_64 no maneja adecuadamente (1) un proceso de 32-bit haciendo una llamada al sistema (syscall) de 64 bit o (2) un proceso de 64-bit haciendo una llamada al sistema (syscall) de 32-bit, lo cual permite a usuarios locales evitar determinadas configuraciones de auditor\u00eda de llamadas al sistema (syscall) a trav\u00e9s de llamadas al sistema (syscall) manipuladas, una cuesti\u00f3n diferente a VE-2009-0342 y CVE-2009-0343.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.28.7\",\"matchCriteriaId\":\"37C3A423-BCC9-4001-A976-8C8620DD22F4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823BF8BE-2309-4F67-A5E2-EAD98F723468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D74A418-50F0-42C0-ABBC-BBBE718FF025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1CA1D49-76E7-4195-98AF-BE916040ECC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941713DB-B1DE-4953-9A9C-174EAFDCB3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73322DEE-27A6-4D18-88A3-ED7F9CAEABD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F87B994-28E4-4095-8770-6433DE9C93AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B5DCF29-6830-45FF-BC88-17E2249C653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B68DF-1440-4587-8458-9C5F4D1E43F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"513797E6-FCE6-4E84-9B66-202541F9601E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BEE9CB-F0AF-44B1-B454-1AE2F04D7299\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0459.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0473.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://scary.beasts.org/security/CESA-2009-001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34084\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34917\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34962\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34981\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35011\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35015\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35120\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35121\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35185\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35390\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35394\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0084\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1787\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1794\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1800\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:118\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0451.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/503610/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33951\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022153\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-751-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=487990\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49061\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0459.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2009-0473.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://scary.beasts.org/security/CESA-2009-001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34917\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34962\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/34981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35120\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35121\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35390\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35394\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1787\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-0451.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/503610/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/33951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022153\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-751-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=487990\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49061\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}
  rhsa-2009:0451
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise MRG 1.1.2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel secure-computing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to bypass intended access restrictions, if those access restriction\nfilters were based on the \"syscall\" number or arguments.\n(CVE-2009-0835, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* an off-by-two error was found in the set_selection() function of the\nLinux kernel. This could allow a local, unprivileged user to cause a denial\nof service when making a selection of characters in a UTF-8 console. Note:\nphysical console access is required to exploit this issue.\n(CVE-2009-1046, Low)\n\nThese updated packages also fix the following bug:\n\n* the __scsi_device_lookup_by_target() function was always returning the\nfirst matching device, regardless of the state of the device. This meant\nthat any valid device listed after a deleted device would not be found. The\n__scsi_device_lookup_by_target() function was modified so that deleted\ndevices are skipped, and valid devices are now found. (BZ#495976)\n\nAll Red Hat Enterprise MRG users should install this update, which resolves\nthese issues. For this update to take effect, the system must be rebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0451",
        "url": "https://access.redhat.com/errata/RHSA-2009:0451"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "487255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "491787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0451.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:54+00:00",
      "generator": {
        "date": "2025-10-09T13:12:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0451",
      "initial_release_date": "2009-04-29T09:28:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-29T09:28:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-29T05:28:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-111.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-0835",
      "discovery_date": "2009-02-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487255"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: seccomp: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "RHBZ#487255",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0835",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: seccomp: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1046",
      "discovery_date": "2009-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491787"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an \"off-by-two memory error.\" NOTE: it is not clear whether this issue crosses privilege boundaries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: utf8 selection memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "RHBZ#491787",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046"
        }
      ],
      "release_date": "2009-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: utf8 selection memory corruption"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  rhsa-2009:0473
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the ecryptfs_write_metadata_to_contents() function of\nthe Linux kernel eCryptfs implementation. On systems with a 4096 byte\npage-size, this flaw may have caused 4096 bytes of uninitialized kernel\nmemory to be written into the eCryptfs file headers, leading to an\ninformation leak. Note: Encrypted files created on systems running the\nvulnerable version of eCryptfs may contain leaked data in the eCryptfs file\nheaders. This update does not remove any leaked data. Refer to the\nKnowledgebase article in the References section for further information.\n(CVE-2009-0787, Moderate)\n\n* the Linux kernel implementation of the Network File System (NFS) did not\nproperly initialize the file name limit in the nfs_server data structure.\nThis flaw could possibly lead to a denial of service on a client mounting\nan NFS share. (CVE-2009-1336, Moderate)\n\nThis update also fixes the following bugs:\n\n* the enic driver (Cisco 10G Ethernet) did not operate under\nvirtualization. (BZ#472474)\n\n* network interfaces using the IBM eHEA Ethernet device driver could not be\nsuccessfully configured under low-memory conditions. (BZ#487035)\n\n* bonding with the \"arp_validate=3\" option may have prevented fail overs.\n(BZ#488064)\n\n* when running under virtualization, the acpi-cpufreq module wrote \"Domain\nattempted WRMSR\" errors to the dmesg log. (BZ#488928)\n\n* NFS clients may have experienced deadlocks during unmount. (BZ#488929)\n\n* the ixgbe driver double counted the number of received bytes and packets.\n(BZ#489459)\n\n* the Wacom Intuos3 Lens Cursor device did not work correctly with the\nWacom Intuos3 12x12 tablet. (BZ#489460)\n\n* on the Itanium\u00ae architecture, nanosleep() caused commands which used it,\nsuch as sleep and usleep, to sleep for one second more than expected.\n(BZ#490434)\n\n* a panic and corruption of slab cache data structures occurred on 64-bit\nPowerPC systems when clvmd was running. (BZ#491677)\n\n* the NONSTOP_TSC feature did not perform correctly on the Intel\u00ae\nmicroarchitecture (Nehalem) when running in 32-bit mode. (BZ#493356)\n\n* keyboards may not have functioned on IBM eServer System p machines after\na certain point during installation or afterward. (BZ#494293)\n\n* using Device Mapper Multipathing with the qla2xxx driver resulted in\nfrequent path failures. (BZ#495635)\n\n* if the hypervisor was booted with the dom0_max_vcpus parameter set to\nless than the actual number of CPUs in the system, and the cpuspeed service\nwas started, the hypervisor could crash. (BZ#495931)\n\n* using Openswan to provide an IPsec virtual private network eventually\nresulted in a CPU soft lockup and a system crash. (BZ#496044)\n\n* it was possible for posix_locks_deadlock() to enter an infinite loop\n(under the BKL), causing a system hang. (BZ#496842)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0473",
        "url": "https://access.redhat.com/errata/RHSA-2009:0473"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "491677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491677"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-16748",
        "url": "http://kbase.redhat.com/faq/docs/DOC-16748"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "487035",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487035"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "488064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488064"
      },
      {
        "category": "external",
        "summary": "488928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488928"
      },
      {
        "category": "external",
        "summary": "488929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488929"
      },
      {
        "category": "external",
        "summary": "489459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489459"
      },
      {
        "category": "external",
        "summary": "489460",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489460"
      },
      {
        "category": "external",
        "summary": "490434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490434"
      },
      {
        "category": "external",
        "summary": "491254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
      },
      {
        "category": "external",
        "summary": "493356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493356"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "494074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
      },
      {
        "category": "external",
        "summary": "494293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494293"
      },
      {
        "category": "external",
        "summary": "495635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495635"
      },
      {
        "category": "external",
        "summary": "495929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495929"
      },
      {
        "category": "external",
        "summary": "495931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495931"
      },
      {
        "category": "external",
        "summary": "496044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496044"
      },
      {
        "category": "external",
        "summary": "496842",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496842"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0473.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:55+00:00",
      "generator": {
        "date": "2025-10-09T13:12:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0473",
      "initial_release_date": "2009-05-07T10:51:00+00:00",
      "revision_history": [
        {
          "date": "2009-05-07T10:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-05-07T06:53:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.10.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0787",
      "discovery_date": "2009-03-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491254"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs file header infoleak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "RHBZ#491254",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0787",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787"
        }
      ],
      "release_date": "2009-03-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ecryptfs file header infoleak"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1336",
      "discovery_date": "2009-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "494074"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "fs/nfs/client.c in the Linux kernel before 2.6.23 does not properly initialize a certain structure member that stores the maximum NFS filename length, which allows local users to cause a denial of service (OOPS) via a long filename, related to the encode_lookup function.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4 client can be crashed by stating a long filename",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "RHBZ#494074",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1336",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336"
        }
      ],
      "release_date": "2007-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsv4 client can be crashed by stating a long filename"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  rhsa-2010_0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:02:48+00:00",
      "generator": {
        "date": "2024-11-22T03:02:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:02:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  RHSA-2009:0473
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the ecryptfs_write_metadata_to_contents() function of\nthe Linux kernel eCryptfs implementation. On systems with a 4096 byte\npage-size, this flaw may have caused 4096 bytes of uninitialized kernel\nmemory to be written into the eCryptfs file headers, leading to an\ninformation leak. Note: Encrypted files created on systems running the\nvulnerable version of eCryptfs may contain leaked data in the eCryptfs file\nheaders. This update does not remove any leaked data. Refer to the\nKnowledgebase article in the References section for further information.\n(CVE-2009-0787, Moderate)\n\n* the Linux kernel implementation of the Network File System (NFS) did not\nproperly initialize the file name limit in the nfs_server data structure.\nThis flaw could possibly lead to a denial of service on a client mounting\nan NFS share. (CVE-2009-1336, Moderate)\n\nThis update also fixes the following bugs:\n\n* the enic driver (Cisco 10G Ethernet) did not operate under\nvirtualization. (BZ#472474)\n\n* network interfaces using the IBM eHEA Ethernet device driver could not be\nsuccessfully configured under low-memory conditions. (BZ#487035)\n\n* bonding with the \"arp_validate=3\" option may have prevented fail overs.\n(BZ#488064)\n\n* when running under virtualization, the acpi-cpufreq module wrote \"Domain\nattempted WRMSR\" errors to the dmesg log. (BZ#488928)\n\n* NFS clients may have experienced deadlocks during unmount. (BZ#488929)\n\n* the ixgbe driver double counted the number of received bytes and packets.\n(BZ#489459)\n\n* the Wacom Intuos3 Lens Cursor device did not work correctly with the\nWacom Intuos3 12x12 tablet. (BZ#489460)\n\n* on the Itanium\u00ae architecture, nanosleep() caused commands which used it,\nsuch as sleep and usleep, to sleep for one second more than expected.\n(BZ#490434)\n\n* a panic and corruption of slab cache data structures occurred on 64-bit\nPowerPC systems when clvmd was running. (BZ#491677)\n\n* the NONSTOP_TSC feature did not perform correctly on the Intel\u00ae\nmicroarchitecture (Nehalem) when running in 32-bit mode. (BZ#493356)\n\n* keyboards may not have functioned on IBM eServer System p machines after\na certain point during installation or afterward. (BZ#494293)\n\n* using Device Mapper Multipathing with the qla2xxx driver resulted in\nfrequent path failures. (BZ#495635)\n\n* if the hypervisor was booted with the dom0_max_vcpus parameter set to\nless than the actual number of CPUs in the system, and the cpuspeed service\nwas started, the hypervisor could crash. (BZ#495931)\n\n* using Openswan to provide an IPsec virtual private network eventually\nresulted in a CPU soft lockup and a system crash. (BZ#496044)\n\n* it was possible for posix_locks_deadlock() to enter an infinite loop\n(under the BKL), causing a system hang. (BZ#496842)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0473",
        "url": "https://access.redhat.com/errata/RHSA-2009:0473"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "491677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491677"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-16748",
        "url": "http://kbase.redhat.com/faq/docs/DOC-16748"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "487035",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487035"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "488064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488064"
      },
      {
        "category": "external",
        "summary": "488928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488928"
      },
      {
        "category": "external",
        "summary": "488929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488929"
      },
      {
        "category": "external",
        "summary": "489459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489459"
      },
      {
        "category": "external",
        "summary": "489460",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489460"
      },
      {
        "category": "external",
        "summary": "490434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490434"
      },
      {
        "category": "external",
        "summary": "491254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
      },
      {
        "category": "external",
        "summary": "493356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493356"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "494074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
      },
      {
        "category": "external",
        "summary": "494293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494293"
      },
      {
        "category": "external",
        "summary": "495635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495635"
      },
      {
        "category": "external",
        "summary": "495929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495929"
      },
      {
        "category": "external",
        "summary": "495931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495931"
      },
      {
        "category": "external",
        "summary": "496044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496044"
      },
      {
        "category": "external",
        "summary": "496842",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496842"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0473.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:55+00:00",
      "generator": {
        "date": "2025-10-09T13:12:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0473",
      "initial_release_date": "2009-05-07T10:51:00+00:00",
      "revision_history": [
        {
          "date": "2009-05-07T10:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-05-07T06:53:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.10.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0787",
      "discovery_date": "2009-03-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491254"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs file header infoleak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "RHBZ#491254",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0787",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787"
        }
      ],
      "release_date": "2009-03-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ecryptfs file header infoleak"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1336",
      "discovery_date": "2009-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "494074"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "fs/nfs/client.c in the Linux kernel before 2.6.23 does not properly initialize a certain structure member that stores the maximum NFS filename length, which allows local users to cause a denial of service (OOPS) via a long filename, related to the encode_lookup function.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4 client can be crashed by stating a long filename",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "RHBZ#494074",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1336",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336"
        }
      ],
      "release_date": "2007-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsv4 client can be crashed by stating a long filename"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  rhsa-2009_0459
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* the sock_getsockopt() function in the Linux kernel did not properly\ninitialize a data structure that can be directly returned to user-space\nwhen the getsockopt() function is called with SO_BSDCOMPAT optname set.\nThis flaw could possibly lead to memory disclosure.\n(CVE-2009-0676, Moderate)\n\nBug fixes:\n\n* a kernel crash may have occurred for Red Hat Enterprise Linux 4.7 guests\nif their guest configuration file specified \"vif = [ \"type=ioemu\" ]\". This\ncrash only occurred when starting guests via the \"xm create\" command.\n(BZ#477146)\n\n* a bug in IO-APIC NMI watchdog may have prevented Red Hat Enterprise Linux\n4.7 from being installed on HP ProLiant DL580 G5 systems. Hangs during\ninstallation and \"NMI received for unknown reason [xx]\" errors may have\noccurred. (BZ#479184)\n\n* a kernel deadlock on some systems when using netdump through a network\ninterface that uses the igb driver. (BZ#480579)\n\n* a possible kernel hang in sys_ptrace() on the Itanium\u00ae architecture,\npossibly triggered by tracing a threaded process with strace. (BZ#484904)\n\n* the RHSA-2008:0665 errata only fixed the known problem with the LSI Logic\nLSI53C1030 Ultra320 SCSI controller, for tape devices. Read commands sent\nto tape devices may have received incorrect data. This issue may have led\nto data corruption. This update includes a fix for all types of devices.\n(BZ#487399)\n\n* a missing memory barrier caused a race condition in the AIO subsystem\nbetween the read_events() and aio_complete() functions. This may have\ncaused a thread in read_events() to sleep indefinitely, possibly causing an\napplication hang. (BZ#489935)\n\n* due to a lack of synchronization in the NFS client code, modifications\nto some pages (for files on an NFS mounted file system) made through a\nregion of memory mapped by mmap() may be lost if the NFS client invalidates\nits page cache for particular files. (BZ#490119)\n\n* a NULL pointer dereference in the megaraid_mbox driver caused a system\ncrash on some systems. (BZ#493420)\n\n* the ext3_symlink() function in the ext3 file system code used an\nillegal __GFP_FS allocation inside some transactions. This may have\nresulted in a kernel panic and \"Assertion failure\" errors. (BZ#493422)\n\n* do_machine_check() cleared all Machine Check Exception (MCE) status\nregisters, preventing the BIOS from using them to determine the cause of\ncertain panics and errors. (BZ#494915)\n\n* a bug prevented NMI watchdog from initializing on HP ProLiant DL580 G5\nsystems. (BZ#497330)\n\nThis update contains backported patches to fix these issues. The system\nmust be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0459",
        "url": "https://access.redhat.com/errata/RHSA-2009:0459"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "477146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=477146"
      },
      {
        "category": "external",
        "summary": "479184",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479184"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "480579",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=480579"
      },
      {
        "category": "external",
        "summary": "484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484904"
      },
      {
        "category": "external",
        "summary": "486305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
      },
      {
        "category": "external",
        "summary": "487399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487399"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "489935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489935"
      },
      {
        "category": "external",
        "summary": "490119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490119"
      },
      {
        "category": "external",
        "summary": "493420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493420"
      },
      {
        "category": "external",
        "summary": "493422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493422"
      },
      {
        "category": "external",
        "summary": "497330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497330"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0459.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:12:42+00:00",
      "generator": {
        "date": "2024-11-22T03:12:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:0459",
      "initial_release_date": "2009-04-30T21:22:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-30T21:22:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-30T17:24:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:12:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.22.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0676",
      "discovery_date": "2009-02-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "486305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory disclosure in SO_BSDCOMPAT gsopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "RHBZ#486305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0676",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676"
        }
      ],
      "release_date": "2009-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory disclosure in SO_BSDCOMPAT gsopt"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    }
  ]
}
  rhsa-2009_0473
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* a flaw was found in the ecryptfs_write_metadata_to_contents() function of\nthe Linux kernel eCryptfs implementation. On systems with a 4096 byte\npage-size, this flaw may have caused 4096 bytes of uninitialized kernel\nmemory to be written into the eCryptfs file headers, leading to an\ninformation leak. Note: Encrypted files created on systems running the\nvulnerable version of eCryptfs may contain leaked data in the eCryptfs file\nheaders. This update does not remove any leaked data. Refer to the\nKnowledgebase article in the References section for further information.\n(CVE-2009-0787, Moderate)\n\n* the Linux kernel implementation of the Network File System (NFS) did not\nproperly initialize the file name limit in the nfs_server data structure.\nThis flaw could possibly lead to a denial of service on a client mounting\nan NFS share. (CVE-2009-1336, Moderate)\n\nThis update also fixes the following bugs:\n\n* the enic driver (Cisco 10G Ethernet) did not operate under\nvirtualization. (BZ#472474)\n\n* network interfaces using the IBM eHEA Ethernet device driver could not be\nsuccessfully configured under low-memory conditions. (BZ#487035)\n\n* bonding with the \"arp_validate=3\" option may have prevented fail overs.\n(BZ#488064)\n\n* when running under virtualization, the acpi-cpufreq module wrote \"Domain\nattempted WRMSR\" errors to the dmesg log. (BZ#488928)\n\n* NFS clients may have experienced deadlocks during unmount. (BZ#488929)\n\n* the ixgbe driver double counted the number of received bytes and packets.\n(BZ#489459)\n\n* the Wacom Intuos3 Lens Cursor device did not work correctly with the\nWacom Intuos3 12x12 tablet. (BZ#489460)\n\n* on the Itanium\u00ae architecture, nanosleep() caused commands which used it,\nsuch as sleep and usleep, to sleep for one second more than expected.\n(BZ#490434)\n\n* a panic and corruption of slab cache data structures occurred on 64-bit\nPowerPC systems when clvmd was running. (BZ#491677)\n\n* the NONSTOP_TSC feature did not perform correctly on the Intel\u00ae\nmicroarchitecture (Nehalem) when running in 32-bit mode. (BZ#493356)\n\n* keyboards may not have functioned on IBM eServer System p machines after\na certain point during installation or afterward. (BZ#494293)\n\n* using Device Mapper Multipathing with the qla2xxx driver resulted in\nfrequent path failures. (BZ#495635)\n\n* if the hypervisor was booted with the dom0_max_vcpus parameter set to\nless than the actual number of CPUs in the system, and the cpuspeed service\nwas started, the hypervisor could crash. (BZ#495931)\n\n* using Openswan to provide an IPsec virtual private network eventually\nresulted in a CPU soft lockup and a system crash. (BZ#496044)\n\n* it was possible for posix_locks_deadlock() to enter an infinite loop\n(under the BKL), causing a system hang. (BZ#496842)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0473",
        "url": "https://access.redhat.com/errata/RHSA-2009:0473"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://kbase.redhat.com/faq/docs/DOC-16748",
        "url": "http://kbase.redhat.com/faq/docs/DOC-16748"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "487035",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487035"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "488064",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488064"
      },
      {
        "category": "external",
        "summary": "488928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488928"
      },
      {
        "category": "external",
        "summary": "488929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488929"
      },
      {
        "category": "external",
        "summary": "489459",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489459"
      },
      {
        "category": "external",
        "summary": "489460",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489460"
      },
      {
        "category": "external",
        "summary": "490434",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490434"
      },
      {
        "category": "external",
        "summary": "491254",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
      },
      {
        "category": "external",
        "summary": "491677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491677"
      },
      {
        "category": "external",
        "summary": "493356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493356"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "external",
        "summary": "494074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
      },
      {
        "category": "external",
        "summary": "494293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494293"
      },
      {
        "category": "external",
        "summary": "495635",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495635"
      },
      {
        "category": "external",
        "summary": "495929",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495929"
      },
      {
        "category": "external",
        "summary": "495931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=495931"
      },
      {
        "category": "external",
        "summary": "496044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496044"
      },
      {
        "category": "external",
        "summary": "496842",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496842"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0473.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:12:47+00:00",
      "generator": {
        "date": "2024-11-22T03:12:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:0473",
      "initial_release_date": "2009-05-07T10:51:00+00:00",
      "revision_history": [
        {
          "date": "2009-05-07T10:51:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-05-07T06:53:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:12:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
                  "product_id": "5Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux (v. 5 server)",
                  "product_id": "5Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:5::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.10.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_id": "kernel-0:2.6.18-128.1.10.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.10.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
          "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.src",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-128.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-128.1.10.el5.noarch",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.i386",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
        "relates_to_product_reference": "5Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
          "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
        "relates_to_product_reference": "5Server"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0787",
      "discovery_date": "2009-03-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491254"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ecryptfs file header infoleak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "RHBZ#491254",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491254"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0787",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0787"
        }
      ],
      "release_date": "2009-03-23T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: ecryptfs file header infoleak"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1336",
      "discovery_date": "2009-04-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "494074"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "fs/nfs/client.c in the Linux kernel before 2.6.23 does not properly initialize a certain structure member that stores the maximum NFS filename length, which allows local users to cause a denial of service (OOPS) via a long filename, related to the encode_lookup function.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: nfsv4 client can be crashed by stating a long filename",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "RHBZ#494074",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494074"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1336",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1336"
        }
      ],
      "release_date": "2007-09-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: nfsv4 client can be crashed by stating a long filename"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-0:2.6.18-128.1.10.el5.src",
          "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-0:2.6.18-128.1.10.el5.src",
          "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
          "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
          "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-05-07T10:51:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0473"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Client:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-0:2.6.18-128.1.10.el5.src",
            "5Client:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Client:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Client:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-0:2.6.18-128.1.10.el5.src",
            "5Server:kernel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-PAE-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-PAE-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debug-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-debuginfo-common-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-devel-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-doc-0:2.6.18-128.1.10.el5.noarch",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.i386",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-headers-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.ppc64",
            "5Server:kernel-kdump-devel-0:2.6.18-128.1.10.el5.s390x",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.10.el5.x86_64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.i686",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.ia64",
            "5Server:kernel-xen-devel-0:2.6.18-128.1.10.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  rhsa-2009:0459
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* the sock_getsockopt() function in the Linux kernel did not properly\ninitialize a data structure that can be directly returned to user-space\nwhen the getsockopt() function is called with SO_BSDCOMPAT optname set.\nThis flaw could possibly lead to memory disclosure.\n(CVE-2009-0676, Moderate)\n\nBug fixes:\n\n* a kernel crash may have occurred for Red Hat Enterprise Linux 4.7 guests\nif their guest configuration file specified \"vif = [ \"type=ioemu\" ]\". This\ncrash only occurred when starting guests via the \"xm create\" command.\n(BZ#477146)\n\n* a bug in IO-APIC NMI watchdog may have prevented Red Hat Enterprise Linux\n4.7 from being installed on HP ProLiant DL580 G5 systems. Hangs during\ninstallation and \"NMI received for unknown reason [xx]\" errors may have\noccurred. (BZ#479184)\n\n* a kernel deadlock on some systems when using netdump through a network\ninterface that uses the igb driver. (BZ#480579)\n\n* a possible kernel hang in sys_ptrace() on the Itanium\u00ae architecture,\npossibly triggered by tracing a threaded process with strace. (BZ#484904)\n\n* the RHSA-2008:0665 errata only fixed the known problem with the LSI Logic\nLSI53C1030 Ultra320 SCSI controller, for tape devices. Read commands sent\nto tape devices may have received incorrect data. This issue may have led\nto data corruption. This update includes a fix for all types of devices.\n(BZ#487399)\n\n* a missing memory barrier caused a race condition in the AIO subsystem\nbetween the read_events() and aio_complete() functions. This may have\ncaused a thread in read_events() to sleep indefinitely, possibly causing an\napplication hang. (BZ#489935)\n\n* due to a lack of synchronization in the NFS client code, modifications\nto some pages (for files on an NFS mounted file system) made through a\nregion of memory mapped by mmap() may be lost if the NFS client invalidates\nits page cache for particular files. (BZ#490119)\n\n* a NULL pointer dereference in the megaraid_mbox driver caused a system\ncrash on some systems. (BZ#493420)\n\n* the ext3_symlink() function in the ext3 file system code used an\nillegal __GFP_FS allocation inside some transactions. This may have\nresulted in a kernel panic and \"Assertion failure\" errors. (BZ#493422)\n\n* do_machine_check() cleared all Machine Check Exception (MCE) status\nregisters, preventing the BIOS from using them to determine the cause of\ncertain panics and errors. (BZ#494915)\n\n* a bug prevented NMI watchdog from initializing on HP ProLiant DL580 G5\nsystems. (BZ#497330)\n\nThis update contains backported patches to fix these issues. The system\nmust be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0459",
        "url": "https://access.redhat.com/errata/RHSA-2009:0459"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "477146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=477146"
      },
      {
        "category": "external",
        "summary": "479184",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479184"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "480579",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=480579"
      },
      {
        "category": "external",
        "summary": "484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484904"
      },
      {
        "category": "external",
        "summary": "486305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
      },
      {
        "category": "external",
        "summary": "487399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487399"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "489935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489935"
      },
      {
        "category": "external",
        "summary": "490119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490119"
      },
      {
        "category": "external",
        "summary": "493420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493420"
      },
      {
        "category": "external",
        "summary": "493422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493422"
      },
      {
        "category": "external",
        "summary": "497330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497330"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0459.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:55+00:00",
      "generator": {
        "date": "2025-10-09T13:12:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0459",
      "initial_release_date": "2009-04-30T21:22:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-30T21:22:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-30T17:24:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.22.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0676",
      "discovery_date": "2009-02-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "486305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory disclosure in SO_BSDCOMPAT gsopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "RHBZ#486305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0676",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676"
        }
      ],
      "release_date": "2009-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory disclosure in SO_BSDCOMPAT gsopt"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    }
  ]
}
  rhsa-2009_0451
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise MRG 1.1.2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel secure-computing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to bypass intended access restrictions, if those access restriction\nfilters were based on the \"syscall\" number or arguments.\n(CVE-2009-0835, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* an off-by-two error was found in the set_selection() function of the\nLinux kernel. This could allow a local, unprivileged user to cause a denial\nof service when making a selection of characters in a UTF-8 console. Note:\nphysical console access is required to exploit this issue.\n(CVE-2009-1046, Low)\n\nThese updated packages also fix the following bug:\n\n* the __scsi_device_lookup_by_target() function was always returning the\nfirst matching device, regardless of the state of the device. This meant\nthat any valid device listed after a deleted device would not be found. The\n__scsi_device_lookup_by_target() function was modified so that deleted\ndevices are skipped, and valid devices are now found. (BZ#495976)\n\nAll Red Hat Enterprise MRG users should install this update, which resolves\nthese issues. For this update to take effect, the system must be rebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0451",
        "url": "https://access.redhat.com/errata/RHSA-2009:0451"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "487255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "491787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0451.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2024-11-22T03:12:37+00:00",
      "generator": {
        "date": "2024-11-22T03:12:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2009:0451",
      "initial_release_date": "2009-04-29T09:28:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-29T09:28:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-29T05:28:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:12:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-111.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-0835",
      "discovery_date": "2009-02-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487255"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: seccomp: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "RHBZ#487255",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0835",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: seccomp: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1046",
      "discovery_date": "2009-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491787"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an \"off-by-two memory error.\" NOTE: it is not clear whether this issue crosses privilege boundaries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: utf8 selection memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "RHBZ#491787",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046"
        }
      ],
      "release_date": "2009-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: utf8 selection memory corruption"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  rhsa-2010:0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:20+00:00",
      "generator": {
        "date": "2025-10-09T13:07:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  RHSA-2009:0451
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel-rt packages that fix several security issues and a bug are\nnow available for Red Hat Enterprise MRG 1.1.2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel secure-computing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to bypass intended access restrictions, if those access restriction\nfilters were based on the \"syscall\" number or arguments.\n(CVE-2009-0835, Important)\n\n* the exit_notify() function in the Linux kernel did not properly reset the\nexit signal if a process executed a set user ID (setuid) application before\nexiting. This could allow a local, unprivileged user to elevate their\nprivileges. (CVE-2009-1337, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* an off-by-two error was found in the set_selection() function of the\nLinux kernel. This could allow a local, unprivileged user to cause a denial\nof service when making a selection of characters in a UTF-8 console. Note:\nphysical console access is required to exploit this issue.\n(CVE-2009-1046, Low)\n\nThese updated packages also fix the following bug:\n\n* the __scsi_device_lookup_by_target() function was always returning the\nfirst matching device, regardless of the state of the device. This meant\nthat any valid device listed after a deleted device would not be found. The\n__scsi_device_lookup_by_target() function was modified so that deleted\ndevices are skipped, and valid devices are now found. (BZ#495976)\n\nAll Red Hat Enterprise MRG users should install this update, which resolves\nthese issues. For this update to take effect, the system must be rebooted.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0451",
        "url": "https://access.redhat.com/errata/RHSA-2009:0451"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "487255",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "491787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
      },
      {
        "category": "external",
        "summary": "493771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0451.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:54+00:00",
      "generator": {
        "date": "2025-10-09T13:12:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0451",
      "initial_release_date": "2009-04-29T09:28:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-29T09:28:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-29T05:28:23+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "MRG Realtime for RHEL 5 Server",
                "product": {
                  "name": "MRG Realtime for RHEL 5 Server",
                  "product_id": "5Server-MRG-Realtime-1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise MRG for RHEL-5"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                "product": {
                  "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-111.el5rt?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                "product": {
                  "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_id": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-111.el5rt?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                "product": {
                  "name": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_id": "kernel-rt-0:2.6.24.7-111.el5rt.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-111.el5rt?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.src as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.src",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch"
        },
        "product_reference": "kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server",
          "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        },
        "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64",
        "relates_to_product_reference": "5Server-MRG-Realtime-1.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-0835",
      "discovery_date": "2009-02-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487255"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: seccomp: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "RHBZ#487255",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487255"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0835",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0835"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0835"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: seccomp: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1046",
      "discovery_date": "2009-02-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "491787"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an \"off-by-two memory error.\" NOTE: it is not clear whether this issue crosses privilege boundaries.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: utf8 selection memory corruption",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "RHBZ#491787",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491787"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1046",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1046"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1046"
        }
      ],
      "release_date": "2009-01-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: utf8 selection memory corruption"
    },
    {
      "cve": "CVE-2009-1337",
      "discovery_date": "2009-04-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "493771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
          "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
          "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "RHBZ#493771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1337",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1337"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-29T09:28:00+00:00",
          "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use the\nRed Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0451"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.src",
            "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-111.el5rt.noarch",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-111.el5rt.x86_64",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.i686",
            "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-111.el5rt.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: exit_notify: kill the wrong capable(CAP_KILL) check"
    }
  ]
}
  RHSA-2009:0459
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a logic error was found in the do_setlk() function of the Linux kernel\nNetwork File System (NFS) implementation. If a signal interrupted a lock\nrequest, the local POSIX lock was incorrectly created. This could cause a\ndenial of service on the NFS server if a file descriptor was closed before\nits corresponding lock request returned. (CVE-2008-4307, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments.\n(CVE-2009-0834, Important)\n\n* Chris Evans reported a deficiency in the Linux kernel signals\nimplementation. The clone() system call permits the caller to indicate the\nsignal it wants to receive when its child exits. When clone() is called\nwith the CLONE_PARENT flag, it permits the caller to clone a new child that\nshares the same parent as itself, enabling the indicated signal to be sent\nto the caller\u0027s parent (instead of the caller), even if the caller\u0027s parent\nhas different real and effective user IDs. This could lead to a denial of\nservice of the parent. (CVE-2009-0028, Moderate)\n\n* the sock_getsockopt() function in the Linux kernel did not properly\ninitialize a data structure that can be directly returned to user-space\nwhen the getsockopt() function is called with SO_BSDCOMPAT optname set.\nThis flaw could possibly lead to memory disclosure.\n(CVE-2009-0676, Moderate)\n\nBug fixes:\n\n* a kernel crash may have occurred for Red Hat Enterprise Linux 4.7 guests\nif their guest configuration file specified \"vif = [ \"type=ioemu\" ]\". This\ncrash only occurred when starting guests via the \"xm create\" command.\n(BZ#477146)\n\n* a bug in IO-APIC NMI watchdog may have prevented Red Hat Enterprise Linux\n4.7 from being installed on HP ProLiant DL580 G5 systems. Hangs during\ninstallation and \"NMI received for unknown reason [xx]\" errors may have\noccurred. (BZ#479184)\n\n* a kernel deadlock on some systems when using netdump through a network\ninterface that uses the igb driver. (BZ#480579)\n\n* a possible kernel hang in sys_ptrace() on the Itanium\u00ae architecture,\npossibly triggered by tracing a threaded process with strace. (BZ#484904)\n\n* the RHSA-2008:0665 errata only fixed the known problem with the LSI Logic\nLSI53C1030 Ultra320 SCSI controller, for tape devices. Read commands sent\nto tape devices may have received incorrect data. This issue may have led\nto data corruption. This update includes a fix for all types of devices.\n(BZ#487399)\n\n* a missing memory barrier caused a race condition in the AIO subsystem\nbetween the read_events() and aio_complete() functions. This may have\ncaused a thread in read_events() to sleep indefinitely, possibly causing an\napplication hang. (BZ#489935)\n\n* due to a lack of synchronization in the NFS client code, modifications\nto some pages (for files on an NFS mounted file system) made through a\nregion of memory mapped by mmap() may be lost if the NFS client invalidates\nits page cache for particular files. (BZ#490119)\n\n* a NULL pointer dereference in the megaraid_mbox driver caused a system\ncrash on some systems. (BZ#493420)\n\n* the ext3_symlink() function in the ext3 file system code used an\nillegal __GFP_FS allocation inside some transactions. This may have\nresulted in a kernel panic and \"Assertion failure\" errors. (BZ#493422)\n\n* do_machine_check() cleared all Machine Check Exception (MCE) status\nregisters, preventing the BIOS from using them to determine the cause of\ncertain panics and errors. (BZ#494915)\n\n* a bug prevented NMI watchdog from initializing on HP ProLiant DL580 G5\nsystems. (BZ#497330)\n\nThis update contains backported patches to fix these issues. The system\nmust be rebooted for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:0459",
        "url": "https://access.redhat.com/errata/RHSA-2009:0459"
      },
      {
        "category": "external",
        "summary": "http://www.redhat.com/security/updates/classification/#important",
        "url": "http://www.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "456282",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
      },
      {
        "category": "external",
        "summary": "477146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=477146"
      },
      {
        "category": "external",
        "summary": "479184",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479184"
      },
      {
        "category": "external",
        "summary": "479932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
      },
      {
        "category": "external",
        "summary": "480579",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=480579"
      },
      {
        "category": "external",
        "summary": "484904",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484904"
      },
      {
        "category": "external",
        "summary": "486305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
      },
      {
        "category": "external",
        "summary": "487399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487399"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "489935",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489935"
      },
      {
        "category": "external",
        "summary": "490119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490119"
      },
      {
        "category": "external",
        "summary": "493420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493420"
      },
      {
        "category": "external",
        "summary": "493422",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=493422"
      },
      {
        "category": "external",
        "summary": "497330",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497330"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_0459.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:12:55+00:00",
      "generator": {
        "date": "2025-10-09T13:12:55+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2009:0459",
      "initial_release_date": "2009-04-30T21:22:00+00:00",
      "revision_history": [
        {
          "date": "2009-04-30T21:22:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-04-30T17:24:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:12:55+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4",
                  "product_id": "4AS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::as"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop version 4",
                  "product_id": "4Desktop",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4",
                  "product_id": "4ES",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::es"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4",
                  "product_id": "4WS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                "product": {
                  "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_id": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.22.EL?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_id": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.22.EL?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.src",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                "product": {
                  "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.22.EL?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=ppc64iseries"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64iseries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_id": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.22.EL?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
          "product_id": "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4AS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
          "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4Desktop"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
          "product_id": "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4ES"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.src as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.src"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.src",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.s390x",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.9-78.0.22.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.9-78.0.22.EL.noarch",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
        "relates_to_product_reference": "4WS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
          "product_id": "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        },
        "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
        "relates_to_product_reference": "4WS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-4307",
      "discovery_date": "2008-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "456282"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Kernel BUG() in locks_remove_flock",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "RHBZ#456282",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=456282"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4307",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4307"
        }
      ],
      "release_date": "2008-10-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Kernel BUG() in locks_remove_flock"
    },
    {
      "cve": "CVE-2009-0028",
      "discovery_date": "2009-01-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "479932"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Linux kernel minor signal handling vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "RHBZ#479932",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=479932"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0028",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0028"
        }
      ],
      "release_date": "2009-02-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Linux kernel minor signal handling vulnerability"
    },
    {
      "cve": "CVE-2009-0676",
      "discovery_date": "2009-02-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "486305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: memory disclosure in SO_BSDCOMPAT gsopt",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "RHBZ#486305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0676",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0676"
        }
      ],
      "release_date": "2009-02-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: memory disclosure in SO_BSDCOMPAT gsopt"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-0:2.6.9-78.0.22.EL.src",
          "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
          "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-0:2.6.9-78.0.22.EL.src",
          "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-0:2.6.9-78.0.22.EL.src",
          "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
          "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
          "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
          "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
          "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-04-30T21:22:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:0459"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-0:2.6.9-78.0.22.EL.src",
            "4AS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4AS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4AS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4AS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4AS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.src",
            "4Desktop:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4Desktop:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4Desktop:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4Desktop:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4Desktop:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-0:2.6.9-78.0.22.EL.src",
            "4ES:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4ES:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4ES:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4ES:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4ES:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-0:2.6.9-78.0.22.EL.src",
            "4WS:kernel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-debuginfo-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.ppc64iseries",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.s390x",
            "4WS:kernel-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-doc-0:2.6.9-78.0.22.EL.noarch",
            "4WS:kernel-hugemem-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-hugemem-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ia64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.ppc64",
            "4WS:kernel-largesmp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-smp-devel-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-0:2.6.9-78.0.22.EL.x86_64",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.i686",
            "4WS:kernel-xenU-devel-0:2.6.9-78.0.22.EL.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    }
  ]
}
  RHSA-2010:0079
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.2 Extended Update Support.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* a flaw was found in the IPv6 Extension Header (EH) handling\nimplementation in the Linux kernel. The skb-\u003edst data structure was not\nproperly validated in the ipv6_hop_jumbo() function. This could possibly\nlead to a remote denial of service. (CVE-2007-4567, Important)\n\n* the possibility of a timeout value overflow was found in the Linux kernel\nhigh-resolution timers functionality, hrtimers. This could allow a local,\nunprivileged user to execute arbitrary code, or cause a denial of service\n(kernel panic). (CVE-2007-5966, Important)\n\n* memory leaks were found on some error paths in the icmp_send()\nfunction in the Linux kernel. This could, potentially, cause the network\nconnectivity to cease. (CVE-2009-0778, Important)\n\n* a deficiency was found in the Linux kernel system call auditing\nimplementation on 64-bit systems. This could allow a local, unprivileged\nuser to circumvent a system call audit configuration, if that configuration\nfiltered based on the \"syscall\" number or arguments. (CVE-2009-0834,\nImportant)\n\n* a flaw was found in the Intel PRO/1000 Linux driver (e1000) in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags were not cleared when a\nsetuid or setgid program was executed. A local, unprivileged user could use\nthis flaw to bypass the mmap_min_addr protection mechanism and perform a\nNULL pointer dereference attack, or bypass the Address Space Layout\nRandomization (ASLR) security feature. (CVE-2009-1895, Important)\n\n* a flaw was found in each of the following Intel PRO/1000 Linux drivers in\nthe Linux kernel: e1000 and e1000e. A remote attacker using packets larger\nthan the MTU could bypass the existing fragment check, resulting in\npartial, invalid frames being passed to the network stack. These flaws\ncould also possibly be used to trigger a remote denial of service.\n(CVE-2009-4536, CVE-2009-4538, Important)\n\n* a flaw was found in the Realtek r8169 Ethernet driver in the Linux\nkernel. Receiving overly-long frames with a certain revision of the network\ncards supported by this driver could possibly result in a remote denial of\nservice. (CVE-2009-4537, Important)\n\nNote: This update also fixes several bugs. Documentation for these bug\nfixes will be available shortly from\nwww.redhat.com/docs/en-US/errata/RHSA-2010-0079/Kernel_Security_Update/\nindex.html\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2010:0079",
        "url": "https://access.redhat.com/errata/RHSA-2010:0079"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "453135",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
      },
      {
        "category": "external",
        "summary": "485163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
      },
      {
        "category": "external",
        "summary": "487990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
      },
      {
        "category": "external",
        "summary": "502981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
      },
      {
        "category": "external",
        "summary": "511171",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
      },
      {
        "category": "external",
        "summary": "548074",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548074"
      },
      {
        "category": "external",
        "summary": "548641",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
      },
      {
        "category": "external",
        "summary": "524179",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524179"
      },
      {
        "category": "external",
        "summary": "546226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546226"
      },
      {
        "category": "external",
        "summary": "546227",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546227"
      },
      {
        "category": "external",
        "summary": "546228",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546228"
      },
      {
        "category": "external",
        "summary": "546229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546229"
      },
      {
        "category": "external",
        "summary": "546230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546230"
      },
      {
        "category": "external",
        "summary": "546231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546231"
      },
      {
        "category": "external",
        "summary": "546232",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546232"
      },
      {
        "category": "external",
        "summary": "546233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546233"
      },
      {
        "category": "external",
        "summary": "546234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546234"
      },
      {
        "category": "external",
        "summary": "546236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546236"
      },
      {
        "category": "external",
        "summary": "547299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=547299"
      },
      {
        "category": "external",
        "summary": "550907",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
      },
      {
        "category": "external",
        "summary": "551214",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
      },
      {
        "category": "external",
        "summary": "552126",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
      },
      {
        "category": "external",
        "summary": "553133",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=553133"
      },
      {
        "category": "external",
        "summary": "555052",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=555052"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0079.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-09T13:07:20+00:00",
      "generator": {
        "date": "2025-10-09T13:07:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2010:0079",
      "initial_release_date": "2010-02-02T21:01:00+00:00",
      "revision_history": [
        {
          "date": "2010-02-02T21:01:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2010-02-02T16:01:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T13:07:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux EUS (v. 5.2 server)",
                  "product_id": "5Server-5.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                "product": {
                  "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_id": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-92.1.35.el5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                "product": {
                  "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_id": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-92.1.35.el5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_id": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-92.1.35.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:2.6.18-92.1.35.el5.src",
                "product": {
                  "name": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_id": "kernel-0:2.6.18-92.1.35.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@2.6.18-92.1.35.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                "product": {
                  "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_id": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-92.1.35.el5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.src",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:2.6.18-92.1.35.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch"
        },
        "product_reference": "kernel-doc-0:2.6.18-92.1.35.el5.noarch",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.i386",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x"
        },
        "product_reference": "kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
        "relates_to_product_reference": "5Server-5.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.2 server)",
          "product_id": "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        },
        "product_reference": "kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64",
        "relates_to_product_reference": "5Server-5.2.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2007-4567",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "548641"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: ipv6_hop_jumbo remote system crash",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG. Shipped kernels do not include upstream commit a11d206d that introduced the problem.\n\nThis upstream commit was backported in Red Hat Enterprise Linux 5 via RHBA-2008:0314. It was reported and addressed in Red Hat Enterprise Linux 5 via RHSA-2010:0019.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "RHBZ#548641",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-4567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4567"
        }
      ],
      "release_date": "2007-09-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: ipv6_hop_jumbo remote system crash"
    },
    {
      "cve": "CVE-2007-5966",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2007-12-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "453135"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value.  NOTE: some of these details are obtained from third party information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: non-root can trigger cpu_idle soft lockup",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "RHBZ#453135",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=453135"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5966",
          "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5966"
        }
      ],
      "release_date": "2007-12-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: non-root can trigger cpu_idle soft lockup"
    },
    {
      "cve": "CVE-2009-0778",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2009-02-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "485163"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an \"rt_cache leak.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: rt_cache leak leads to lack of network connectivity",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and Red Hat Enterprise MRG.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "RHBZ#485163",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485163"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0778",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0778"
        }
      ],
      "release_date": "2008-03-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: rt_cache leak leads to lack of network connectivity"
    },
    {
      "cve": "CVE-2009-0834",
      "discovery_date": "2009-03-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "487990"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: x86-64: syscall-audit: 32/64 syscall hole",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "RHBZ#487990",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0834",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
        }
      ],
      "release_date": "2009-02-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: x86-64: syscall-audit: 32/64 syscall hole"
    },
    {
      "cve": "CVE-2009-1385",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-05-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "502981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000_clean_rx_irq() denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "RHBZ#502981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385"
        }
      ],
      "release_date": "2007-04-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000_clean_rx_irq() denial of service"
    },
    {
      "cve": "CVE-2009-1895",
      "discovery_date": "2009-06-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "511171"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: personality: fix PER_CLEAR_ON_SETID",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "RHBZ#511171",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511171"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1895",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1895"
        }
      ],
      "release_date": "2009-06-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: personality: fix PER_CLEAR_ON_SETID"
    },
    {
      "cve": "CVE-2009-4536",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "552126"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "RHBZ#552126",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.8,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4537",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "550907"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing \u0027\\0\u0027 characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: r8169 issue reported at 26c3",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "RHBZ#550907",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4537",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4537"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4537"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: r8169 issue reported at 26c3"
    },
    {
      "cve": "CVE-2009-4538",
      "discovery_date": "2009-12-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "551214"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: e1000e frame fragment issue",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
          "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
          "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
          "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "RHBZ#551214",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4538",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-4538"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4538"
        }
      ],
      "release_date": "2009-12-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2010-02-02T21:01:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2010:0079"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.src",
            "5Server-5.2.Z:kernel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-PAE-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-PAE-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debug-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-debuginfo-common-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-devel-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-doc-0:2.6.18-92.1.35.el5.noarch",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.i386",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-headers-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-debuginfo-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.ppc64",
            "5Server-5.2.Z:kernel-kdump-devel-0:2.6.18-92.1.35.el5.s390x",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-debuginfo-0:2.6.18-92.1.35.el5.x86_64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.i686",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.ia64",
            "5Server-5.2.Z:kernel-xen-devel-0:2.6.18-92.1.35.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "kernel: e1000e frame fragment issue"
    }
  ]
}
  gsd-2009-0834
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2009-0834",
    "description": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
    "id": "GSD-2009-0834",
    "references": [
      "https://www.suse.com/security/cve/CVE-2009-0834.html",
      "https://www.debian.org/security/2009/dsa-1800",
      "https://www.debian.org/security/2009/dsa-1794",
      "https://www.debian.org/security/2009/dsa-1787",
      "https://access.redhat.com/errata/RHSA-2010:0079",
      "https://access.redhat.com/errata/RHSA-2009:0473",
      "https://access.redhat.com/errata/RHSA-2009:0459",
      "https://access.redhat.com/errata/RHSA-2009:0451",
      "https://linux.oracle.com/cve/CVE-2009-0834.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2009-0834"
      ],
      "details": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
      "id": "GSD-2009-0834",
      "modified": "2023-12-13T01:19:44.926448Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2009-0834",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "35390",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35390"
          },
          {
            "name": "1022153",
            "refsource": "SECTRACK",
            "url": "http://www.securitytracker.com/id?1022153"
          },
          {
            "name": "34962",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/34962"
          },
          {
            "name": "MDVSA-2009:118",
            "refsource": "MANDRIVA",
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
          },
          {
            "name": "SUSE-SA:2009:028",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
          },
          {
            "name": "37471",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "RHSA-2009:0459",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
          },
          {
            "name": "http://scary.beasts.org/security/CESA-2009-001.html",
            "refsource": "MISC",
            "url": "http://scary.beasts.org/security/CESA-2009-001.html"
          },
          {
            "name": "linux-kernel-auditsyscallentry-sec-bypass(49061)",
            "refsource": "XF",
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
          },
          {
            "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
            "refsource": "CONFIRM",
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
          },
          {
            "name": "DSA-1794",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2009/dsa-1794"
          },
          {
            "name": "20090516 rPSA-2009-0084-1 kernel",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
          },
          {
            "name": "SUSE-SA:2009:030",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
          },
          {
            "name": "USN-751-1",
            "refsource": "UBUNTU",
            "url": "http://www.ubuntu.com/usn/usn-751-1"
          },
          {
            "name": "35185",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35185"
          },
          {
            "name": "35015",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35015"
          },
          {
            "name": "oval:org.mitre.oval:def:8508",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
          },
          {
            "name": "35011",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35011"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "name": "35120",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35120"
          },
          {
            "name": "SUSE-SA:2009:031",
            "refsource": "SUSE",
            "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
          },
          {
            "name": "34084",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/34084"
          },
          {
            "name": "34981",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/34981"
          },
          {
            "name": "DSA-1800",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2009/dsa-1800"
          },
          {
            "name": "oval:org.mitre.oval:def:9600",
            "refsource": "OVAL",
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
          },
          {
            "name": "34917",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/34917"
          },
          {
            "name": "DSA-1787",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2009/dsa-1787"
          },
          {
            "name": "[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=487990",
            "refsource": "CONFIRM",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
          },
          {
            "name": "RHSA-2009:0473",
            "refsource": "REDHAT",
            "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
          },
          {
            "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084",
            "refsource": "CONFIRM",
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
          },
          {
            "name": "RHSA-2009:0451",
            "refsource": "REDHAT",
            "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
          },
          {
            "name": "[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole",
            "refsource": "MLIST",
            "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
          },
          {
            "name": "35121",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35121"
          },
          {
            "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c",
            "refsource": "CONFIRM",
            "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
          },
          {
            "name": "ADV-2009-3316",
            "refsource": "VUPEN",
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "name": "33951",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/33951"
          },
          {
            "name": "35394",
            "refsource": "SECUNIA",
            "url": "http://secunia.com/advisories/35394"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.6.28.7",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0834"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-noinfo"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=487990",
              "refsource": "CONFIRM",
              "tags": [
                "Issue Tracking",
                "Patch",
                "Third Party Advisory"
              ],
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
            },
            {
              "name": "34084",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/34084"
            },
            {
              "name": "33951",
              "refsource": "BID",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/bid/33951"
            },
            {
              "name": "[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
            },
            {
              "name": "[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole",
              "refsource": "MLIST",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
            },
            {
              "name": "http://scary.beasts.org/security/CESA-2009-001.html",
              "refsource": "MISC",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://scary.beasts.org/security/CESA-2009-001.html"
            },
            {
              "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c",
              "refsource": "CONFIRM",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
            },
            {
              "name": "USN-751-1",
              "refsource": "UBUNTU",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.ubuntu.com/usn/usn-751-1"
            },
            {
              "name": "RHSA-2009:0451",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
            },
            {
              "name": "34917",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/34917"
            },
            {
              "name": "34962",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/34962"
            },
            {
              "name": "RHSA-2009:0459",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
            },
            {
              "name": "DSA-1787",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.debian.org/security/2009/dsa-1787"
            },
            {
              "name": "34981",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/34981"
            },
            {
              "name": "35011",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35011"
            },
            {
              "name": "DSA-1794",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.debian.org/security/2009/dsa-1794"
            },
            {
              "name": "1022153",
              "refsource": "SECTRACK",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securitytracker.com/id?1022153"
            },
            {
              "name": "35015",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35015"
            },
            {
              "name": "RHSA-2009:0473",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
            },
            {
              "name": "SUSE-SA:2009:028",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
            },
            {
              "name": "35121",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35121"
            },
            {
              "name": "DSA-1800",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.debian.org/security/2009/dsa-1800"
            },
            {
              "name": "MDVSA-2009:118",
              "refsource": "MANDRIVA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
            },
            {
              "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0084",
              "refsource": "CONFIRM",
              "tags": [
                "Broken Link"
              ],
              "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
            },
            {
              "name": "35185",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35185"
            },
            {
              "name": "35120",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35120"
            },
            {
              "name": "35394",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35394"
            },
            {
              "name": "SUSE-SA:2009:030",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
            },
            {
              "name": "SUSE-SA:2009:031",
              "refsource": "SUSE",
              "tags": [
                "Mailing List",
                "Third Party Advisory"
              ],
              "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
            },
            {
              "name": "35390",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/35390"
            },
            {
              "name": "37471",
              "refsource": "SECUNIA",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://secunia.com/advisories/37471"
            },
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
            },
            {
              "name": "ADV-2009-3316",
              "refsource": "VUPEN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.vupen.com/english/advisories/2009/3316"
            },
            {
              "name": "linux-kernel-auditsyscallentry-sec-bypass(49061)",
              "refsource": "XF",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
            },
            {
              "name": "oval:org.mitre.oval:def:9600",
              "refsource": "OVAL",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
            },
            {
              "name": "oval:org.mitre.oval:def:8508",
              "refsource": "OVAL",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
            },
            {
              "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
              "refsource": "BUGTRAQ",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
            },
            {
              "name": "20090516 rPSA-2009-0084-1 kernel",
              "refsource": "BUGTRAQ",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 4.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "LOW",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2020-08-26T12:57Z",
      "publishedDate": "2009-03-06T11:30Z"
    }
  }
}
  fkie_cve-2009-0834
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=linux-kernel&m=123579056530191&w=2 | Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=linux-kernel&m=123579065130246&w=2 | Third Party Advisory | |
| cve@mitre.org | http://marc.info/?l=oss-security&m=123597642832637&w=2 | Third Party Advisory | |
| cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2009-0459.html | Third Party Advisory | |
| cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2009-0473.html | Third Party Advisory | |
| cve@mitre.org | http://scary.beasts.org/security/CESA-2009-001.html | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/34084 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/34917 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/34962 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/34981 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35011 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35015 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35120 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35121 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35185 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35390 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35394 | Third Party Advisory | |
| cve@mitre.org | http://secunia.com/advisories/37471 | Third Party Advisory | |
| cve@mitre.org | http://wiki.rpath.com/Advisories:rPSA-2009-0084 | Broken Link | |
| cve@mitre.org | http://www.debian.org/security/2009/dsa-1787 | Third Party Advisory | |
| cve@mitre.org | http://www.debian.org/security/2009/dsa-1794 | Third Party Advisory | |
| cve@mitre.org | http://www.debian.org/security/2009/dsa-1800 | Third Party Advisory | |
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:118 | Third Party Advisory | |
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-0451.html | Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/503610/100/0/threaded | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/507985/100/0/threaded | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/bid/33951 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id?1022153 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.ubuntu.com/usn/usn-751-1 | Third Party Advisory | |
| cve@mitre.org | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | Third Party Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/3316 | Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=487990 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/49061 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508 | Third Party Advisory | |
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=123579056530191&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=linux-kernel&m=123579065130246&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=oss-security&m=123597642832637&w=2 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2009-0459.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2009-0473.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://scary.beasts.org/security/CESA-2009-001.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34084 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34917 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34962 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34981 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35011 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35015 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35120 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35121 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35185 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35390 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35394 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37471 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2009-0084 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1787 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1794 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1800 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:118 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-0451.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/503610/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507985/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33951 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022153 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-751-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2009-0016.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3316 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=487990 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49061 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600 | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| debian | debian_linux | 4.0 | |
| debian | debian_linux | 5.0 | |
| canonical | ubuntu_linux | 7.10 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 8.10 | |
| redhat | enterprise_linux_desktop | 4.0 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_eus | 4.7 | |
| redhat | enterprise_linux_eus | 5.3 | |
| redhat | enterprise_linux_server | 4.0 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server_aus | 5.3 | |
| redhat | enterprise_linux_workstation | 4.0 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| opensuse | opensuse | 10.3 | |
| opensuse | opensuse | 11.0 | |
| suse | linux_enterprise_desktop | 10 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_software_development_kit | 10 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C3A423-BCC9-4001-A976-8C8620DD22F4",
              "versionEndIncluding": "2.6.28.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D74A418-50F0-42C0-ABBC-BBBE718FF025",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1CA1D49-76E7-4195-98AF-BE916040ECC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "941713DB-B1DE-4953-9A9C-174EAFDCB3E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "73322DEE-27A6-4D18-88A3-ED7F9CAEABD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F87B994-28E4-4095-8770-6433DE9C93AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B5DCF29-6830-45FF-BC88-17E2249C653D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35B68DF-1440-4587-8458-9C5F4D1E43F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "513797E6-FCE6-4E84-9B66-202541F9601E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "D3BEE9CB-F0AF-44B1-B454-1AE2F04D7299",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n audit_syscall_entry en el n\u00facleo de Linux v2.6.28.7 y versiones anteriores en la plataforma x86_64 no maneja adecuadamente (1) un proceso de 32-bit haciendo una llamada al sistema (syscall) de 64 bit o (2) un proceso de 64-bit haciendo una llamada al sistema (syscall) de 32-bit, lo cual permite a usuarios locales evitar determinadas configuraciones de auditor\u00eda de llamadas al sistema (syscall) a trav\u00e9s de llamadas al sistema (syscall) manipuladas, una cuesti\u00f3n diferente a VE-2009-0342 y CVE-2009-0343."
    }
  ],
  "id": "CVE-2009-0834",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-06T11:30:02.627",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://scary.beasts.org/security/CESA-2009-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34084"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34917"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34962"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34981"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35011"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35015"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35120"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35121"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35185"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35390"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35394"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1787"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1794"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1800"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/33951"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022153"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-751-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://scary.beasts.org/security/CESA-2009-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34962"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/34981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35121"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1800"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/33951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-751-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  ghsa-3cv7-5j4c-h696
Vulnerability from github
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
{
  "affected": [],
  "aliases": [
    "CVE-2009-0834"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2009-03-06T11:30:00Z",
    "severity": "LOW"
  },
  "details": "The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.",
  "id": "GHSA-3cv7-5j4c-h696",
  "modified": "2025-04-09T04:06:04Z",
  "published": "2022-05-02T03:18:39Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0834"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487990"
    },
    {
      "type": "WEB",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49061"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508"
    },
    {
      "type": "WEB",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579056530191\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=linux-kernel\u0026m=123579065130246\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://marc.info/?l=oss-security\u0026m=123597642832637\u0026w=2"
    },
    {
      "type": "WEB",
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0459.html"
    },
    {
      "type": "WEB",
      "url": "http://rhn.redhat.com/errata/RHSA-2009-0473.html"
    },
    {
      "type": "WEB",
      "url": "http://scary.beasts.org/security/CESA-2009-001.html"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/34084"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/34917"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/34962"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/34981"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35011"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35015"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35120"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35121"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35185"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35390"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/35394"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "type": "WEB",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0084"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2009/dsa-1787"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2009/dsa-1794"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2009/dsa-1800"
    },
    {
      "type": "WEB",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:118"
    },
    {
      "type": "WEB",
      "url": "http://www.redhat.com/support/errata/RHSA-2009-0451.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/503610/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/33951"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id?1022153"
    },
    {
      "type": "WEB",
      "url": "http://www.ubuntu.com/usn/usn-751-1"
    },
    {
      "type": "WEB",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "type": "WEB",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}
  CERTA-2009-AVI-513
Vulnerability from certfr_avis
Plusieurs vulnérabilités découvertes dans les produits VMware peuvent être exploitées à distance par un utilisateur malintentionné afin de compromettre le système vulnérable ou encore d'entraver son bon fonctionnement.
Description
Les vulnérabilités présentes dans les produits VMware peuvent être exploitées afin de porter atteinte à l'intégrité et à la confidentialité des données, de réaliser un déni de service, d'injecter et d'exécuter indirectement du code arbitraire, d'élever ses privilèges ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | VMware Server 2.x ; | ||
| VMware | ESXi | VMware ESXi 3.x ; | ||
| VMware | N/A | VMware vMA 4.x. | ||
| VMware | N/A | VMware ESX Server 4.x ; | ||
| VMware | N/A | VMware ESX Server 2.x ; | ||
| VMware | N/A | VMware ESX Server 3.x ; | ||
| VMware | ESXi | VMware ESXi 4.x ; | ||
| VMware | vCenter Server | VMware vCenter Server 4.x ; | ||
| VMware | N/A | VMware VirtualCenter 2.x ; | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Server 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi 3.x ;",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vMA 4.x.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 4.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESX Server 3.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi 4.x ;",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vCenter Server 4.x ;",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware VirtualCenter 2.x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLes vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits VMware peuvent \u00eatre\nexploit\u00e9es afin de porter atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, de r\u00e9aliser un d\u00e9ni de service, d\u0027injecter et d\u0027ex\u00e9cuter\nindirectement du code arbitraire, d\u0027\u00e9lever ses privil\u00e8ges ou d\u0027ex\u00e9cuter\ndu code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-2724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2724"
    },
    {
      "name": "CVE-2009-0676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0676"
    },
    {
      "name": "CVE-2009-2721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2721"
    },
    {
      "name": "CVE-2008-3143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3143"
    },
    {
      "name": "CVE-2009-2692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2692"
    },
    {
      "name": "CVE-2009-2406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2406"
    },
    {
      "name": "CVE-2009-1389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389"
    },
    {
      "name": "CVE-2008-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0002"
    },
    {
      "name": "CVE-2009-1106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
    },
    {
      "name": "CVE-2009-1072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072"
    },
    {
      "name": "CVE-2008-4307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4307"
    },
    {
      "name": "CVE-2009-1104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
    },
    {
      "name": "CVE-2009-2407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2407"
    },
    {
      "name": "CVE-2008-3142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3142"
    },
    {
      "name": "CVE-2009-1101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
    },
    {
      "name": "CVE-2009-2416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
    },
    {
      "name": "CVE-2009-1385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385"
    },
    {
      "name": "CVE-2009-0746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0746"
    },
    {
      "name": "CVE-2009-2673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
    },
    {
      "name": "CVE-2007-5966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5966"
    },
    {
      "name": "CVE-2009-2719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
    },
    {
      "name": "CVE-2008-4864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4864"
    },
    {
      "name": "CVE-2009-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2417"
    },
    {
      "name": "CVE-2009-1439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439"
    },
    {
      "name": "CVE-2009-0322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0322"
    },
    {
      "name": "CVE-2009-1895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1895"
    },
    {
      "name": "CVE-2009-1094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
    },
    {
      "name": "CVE-2009-0748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0748"
    },
    {
      "name": "CVE-2008-3144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3144"
    },
    {
      "name": "CVE-2009-0747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0747"
    },
    {
      "name": "CVE-2009-0580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
    },
    {
      "name": "CVE-2009-1095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
    },
    {
      "name": "CVE-2009-2672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
    },
    {
      "name": "CVE-2009-0675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0675"
    },
    {
      "name": "CVE-2007-5461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
    },
    {
      "name": "CVE-2009-2670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
    },
    {
      "name": "CVE-2009-1102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1102"
    },
    {
      "name": "CVE-2009-1630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630"
    },
    {
      "name": "CVE-2009-0269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0269"
    },
    {
      "name": "CVE-2008-3528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-3528"
    },
    {
      "name": "CVE-2008-5031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5031"
    },
    {
      "name": "CVE-2008-1721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1721"
    },
    {
      "name": "CVE-2009-1388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1388"
    },
    {
      "name": "CVE-2009-1192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192"
    },
    {
      "name": "CVE-2009-2720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
    },
    {
      "name": "CVE-2009-0834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0834"
    },
    {
      "name": "CVE-2009-2671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
    },
    {
      "name": "CVE-2009-2848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2848"
    },
    {
      "name": "CVE-2009-2675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
    },
    {
      "name": "CVE-2008-1232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
    },
    {
      "name": "CVE-2009-0159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
    },
    {
      "name": "CVE-2009-0778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0778"
    },
    {
      "name": "CVE-2009-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
    },
    {
      "name": "CVE-2009-1099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
    },
    {
      "name": "CVE-2009-1252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1252"
    },
    {
      "name": "CVE-2009-2698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2698"
    },
    {
      "name": "CVE-2008-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
    },
    {
      "name": "CVE-2009-0033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
    },
    {
      "name": "CVE-2009-2723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2723"
    },
    {
      "name": "CVE-2009-1107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
    },
    {
      "name": "CVE-2009-2716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
    },
    {
      "name": "CVE-2007-5333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
    },
    {
      "name": "CVE-2008-1947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1947"
    },
    {
      "name": "CVE-2009-1105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
    },
    {
      "name": "CVE-2007-6286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-6286"
    },
    {
      "name": "CVE-2009-0028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0028"
    },
    {
      "name": "CVE-2009-1337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1337"
    },
    {
      "name": "CVE-2009-0781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0781"
    },
    {
      "name": "CVE-2009-2414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
    },
    {
      "name": "CVE-2007-2052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-2052"
    },
    {
      "name": "CVE-2009-1336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1336"
    },
    {
      "name": "CVE-2009-0783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0783"
    },
    {
      "name": "CVE-2008-5515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
    },
    {
      "name": "CVE-2007-4965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4965"
    },
    {
      "name": "CVE-2009-1633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633"
    },
    {
      "name": "CVE-2009-2722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2722"
    },
    {
      "name": "CVE-2008-5700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5700"
    },
    {
      "name": "CVE-2009-1103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
    },
    {
      "name": "CVE-2009-1100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
    },
    {
      "name": "CVE-2009-2676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
    },
    {
      "name": "CVE-2007-5342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-5342"
    },
    {
      "name": "CVE-2009-1096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
    },
    {
      "name": "CVE-2009-1098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
    },
    {
      "name": "CVE-2009-0787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0787"
    },
    {
      "name": "CVE-2008-1887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-1887"
    },
    {
      "name": "CVE-2009-1097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
    },
    {
      "name": "CVE-2009-2847",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2847"
    },
    {
      "name": "CVE-2008-2315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-2315"
    },
    {
      "name": "CVE-2009-0696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0696"
    },
    {
      "name": "CVE-2009-2718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
    },
    {
      "name": "CVE-2009-0745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-0745"
    },
    {
      "name": "CVE-2009-1093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
    }
  ],
  "initial_release_date": "2009-11-24T00:00:00",
  "last_revision_date": "2009-11-24T00:00:00",
  "links": [],
  "reference": "CERTA-2009-AVI-513",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-11-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits VMware peuvent\n\u00eatre exploit\u00e9es \u00e0 distance par un utilisateur malintentionn\u00e9 afin de\ncompromettre le syst\u00e8me vuln\u00e9rable ou encore d\u0027entraver son bon\nfonctionnement.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware du 20 novembre 2009",
      "url": "http://lists.vmware.com/pipermail/security-announce/2009/000070.html"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.